Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
M. Albrecht +4 more
openalex +5 more sources
Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks.
Lansheng Han, Wei Liao, Peng Chen
doaj +2 more sources
Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]
The following investigation examined endoscopic surgical interval rates across a patient with idiopathic subglottic stenosis (iSGS) first 2 years of treatment compared to their last 3 years of treatment over a total of 5 years of follow up. Through comparison of these two intervals a disease severity classification for iSGS based on decreasing ...
Bowen AJ +15 more
europepmc +2 more sources
Nonlinear optical properties of photosensory core modules of monomeric and dimeric bacterial phytochromes. [PDF]
Abstract Near‐infrared (NIR) fluorescent proteins and optogenetic tools derived from bacterial phytochromes' photosensory core modules (PCMs) operate within the first (NIR‐I) tissue transparency window under single‐photon activation. Leveraging two‐photon (2P) light in the second transparency window (NIR‐II) for photoswitching bacterial phytochromes ...
Galiakhmetova D +11 more
europepmc +2 more sources
An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol [PDF]
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency.
Yongli Tang +5 more
doaj +2 more sources
A novel framework for secure cryptocurrency transactions using quantum crypto guard [PDF]
In today’s digital world, cryptocurrencies like Bitcoin can secure transactions without banks. However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition,
Jamil Abedalrahim Jamil Alsayaydeh +4 more
doaj +3 more sources
Practical CCA2-Secure and Masked Ring-LWE Implementation
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Tobias Oder +3 more
doaj +3 more sources
Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence [PDF]
The Internet of Medical Things (IoMT) transforms healthcare by enabling real-time monitoring of patient vitals, such as heart rate and glucose levels, but faces significant challenges in securing sensitive data against cyber threats and ensuring ...
Soufiane Ben Othman, Gyanendra Kumar
doaj +2 more sources
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara +3 more
doaj +2 more sources
A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update [PDF]
Although the copyright protection schemes supported by blockchain have significantly changed traditional copyright data management, there are still some data security challenges that cannot be ignored, especially the secure access and controllable ...
Jian Jiang +3 more
doaj +2 more sources

